Efficient Attribute-Based Encryption Outsourcing Scheme With User and Attribute Revocation for Fog-Enabled IoT

被引:17
|
作者
Li, Ling [1 ]
Wang, Zheng [1 ]
Li, Na [2 ]
机构
[1] Taiyuan Univ Technol, Sch Informat & Comp, Jinzhong 030600, Peoples R China
[2] State Grid Shanxi Elect Power Co, Taiyuan 030024, Peoples R China
关键词
Edge computing; Encryption; Cloud computing; Outsourcing; Logic gates; Servers; Fog computing; attribute-based encryption; revocation; outsourcing; access control; DATA ACCESS-CONTROL; INTERNET; SECURITY; THINGS;
D O I
10.1109/ACCESS.2020.3025140
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of Internet of Things (IoT) applications, fog computing enables the IoT to provide efficient services by extending the cloud computing paradigm to the edge of the network. However, the existing attribute-based encryption schemes rarely focus on user and attribute revocation in fog computing and most of them still impose high computational and storage overhead on resource-limited IoT devices. In this article, we propose an efficient attribute-based encryption outsourcing scheme with user and attribute revocation for fog-enabled IoT. The proposed scheme improves the existing encryption scheme that uses the concept of attribute groups to achieve attribute revocation, making it suitable for fog computing and improving the efficiency of ciphertext update. In addition, it implements a novel method of user revocation in fog computing based on the characteristics of fog computing. In order to reduce the computing and storage burden of IoT devices, the heavy computation operations of encryption and decryption are outsourced to fog nodes and part of secret keys are stored in fog nodes. The security analysis shows that the proposed scheme is secure under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. The performance analysis shows that the proposed scheme has high revocation efficiency and is efficient enough to be deployed in practical fog computing.
引用
收藏
页码:176738 / 176749
页数:12
相关论文
共 50 条
  • [41] Attribute-based broadcast encryption scheme made efficient
    Lubicz, David
    Sirvent, Thomas
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 325 - +
  • [42] New Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Zu, Longhui
    Liu, Zhenhua
    Li, Juanjuan
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 281 - 287
  • [43] Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Li, Yang
    Zhu, Jianming
    Wang, Xiuli
    Chai, Yanmei
    Shao, Shuai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 385 - 394
  • [44] Securely Outsourcing Attribute-Based Encryption with Checkability
    Li, Jin
    Huang, Xinyi
    Li, Jingwei
    Chen, Xiaofeng
    Xiang, Yang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (08) : 2201 - 2210
  • [45] Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage
    Wang, Shangping
    Yao, Lisha
    Zhang, Yaling
    PLOS ONE, 2018, 13 (10):
  • [46] Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
    Zhang, Xiao
    Wu, Faguo
    Yao, Wang
    Wang, Zhao
    Wang, Wenhua
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):
  • [47] Oriented User Group Verifiable Attribute-Based Encryption Scheme
    Liu, Xueyan
    Li, Zhanming
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 415 - 426
  • [48] Searchable Attribute-based Encryption Scheme for Dynamic User Groups
    Wang J.-W.
    Ning J.-T.
    Xu S.-M.
    Yin X.-C.
    Chen H.-X.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (04): : 1907 - 1925
  • [49] Expressive ciphertext-policy attribute-based encryption with direct user revocation
    Bai C.
    Zhang Y.
    Ma H.
    Liu Z.
    International Journal of Embedded Systems, 2017, 9 (06) : 495 - 504
  • [50] Attribute-based Encryption Scheme with Fast Encryption
    一种支持快速加密的基于属性加密方案
    Feng, Chao-Sheng (csfenggy@126.com), 1600, Chinese Academy of Sciences (31): : 3923 - 3936